On Thu, Jul 28, 2022 at 07:47:15PM +0200, Vitaly Zaitsev via devel wrote:
> On 26/07/2022 20:05, Chris Murphy wrote:
> > Summary: Windows 10/11 increasingly enables Bitlocker (full disk 
> > encryption) out of the box with the encryption key sealed in the TPM. Two 
> > different issues result:
> 
> Microsoft has published a new security bulletin on the current state of
> Secure Boot:
> https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process
> 
> The most important note:
> 
> > Secured-core PCs require Secure Boot to be enabled and configured to 
> > distrust the Microsoft 3rd Party UEFI CA signature, by default, to provide 
> > customers with the most secure configuration of their PCs possible.
> 
> TL;DR. The new certified by Microsoft devices will be able to load only
> Microsoft Windows in the UEFI Secure Boot enabled mode.

I read that as meaning there are two different certifications

  * "Certified For Windows PCs"  - the traditional behaviour we've known,
    where the 3rd party UEFI CA  is enabled by defualt

  * "Secured-core PCs" - a new certification promoted as a more secure
    out of the box setup, where 3rd party UEFI CA is disabled by default

This doesn't mean that everything is suddenly going to be 'Secure-cored"
and thus prevent use of shim out of the box.

This other doc gives more details

https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/OEM-highly-secure-11

[quote]
Microsoft works closely with OEM partners to help ensure that all certified
Windows systems deliver a secure operating environment. Windows integrates
closely with the hardware to deliver protections that take advantage of
available hardware capabilities:

   * Baseline Windows security – recommended baseline for all individual
     systems that provides foundational system integrity protections.
     Leverages TPM 2.0 for a hardware root of trust, secure boot and
     BitLocker drive encryption.
   * Virtualization-based security enabled – leverages virtualization
     capabilities from hardware and the hypervisor to provide additional
     protection for critical subsystems and data.
   * Secured-core – recommended for the most sensitive systems and
     industries like financial, healthcare, and government agencies.
     Builds on the previous layers and leverages advanced processor
     capabilities to provide protection from firmware attacks.
[/quote]

An open question is just how widely the OEM hardware vendors will
deploy "Secured core" hardware in practice. If they only do this
for enterprise hardware they sell with Windows pre-installed, then
it might not become a big deal, as those running Linux will typically
opt out of Windows pre-install. If they deploy 'Secured core' across
all hardware, both consumer and enterprise, and/or regardless of OS
preinstall choice, then it will become more of a pain for consumers
wanting to run Linux.

With regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to